Sciweavers

588 search results - page 100 / 118
» Predicting Network Response Times Using Social Information
Sort
View
132
Voted
IJWIS
2007
153views more  IJWIS 2007»
15 years 1 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
KES
2006
Springer
15 years 1 months ago
Spiking Neural Network Based Classification of Task-Evoked EEG Signals
This paper presents an improved technique to detect evoked potentials in continuous EEG recordings using a spiking neural network. Human EEG signals recorded during spell checking,...
Piyush Goel, Honghai Liu, David J. Brown, Avijit D...
BMCBI
2007
198views more  BMCBI 2007»
15 years 1 months ago
Correlation analysis reveals the emergence of coherence in the gene expression dynamics following system perturbation
Time course gene expression experiments are a popular means to infer co-expression. Many methods have been proposed to cluster genes or to build networks based on similarity measu...
Nicola Neretti, Daniel Remondini, Marc Tatar, John...
EUSFLAT
2003
131views Fuzzy Logic» more  EUSFLAT 2003»
15 years 3 months ago
From communication networks to fuzzy sets
In 1931 and 1935, Ernst Adolph Guillemin, professor of electrical engineering at Masachusetts Institute of Technology (MIT), published the two volumes of his book “Communication...
Rudolf Seising
167
Voted
CORR
2011
Springer
193views Education» more  CORR 2011»
14 years 5 months ago
How Unique and Traceable are Usernames?
Abstract. Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses ...
Daniele Perito, Claude Castelluccia, Mohamed Ali K...